Brad Hards
2
Contents 1 Introduction 5 2 The Remote Frame Buffer protocol 6 3 Using Desktop Sharing 7 3.1 Managing Desktop Sharing invitations.......................... 9 3.2 Quit Desktop Sharing.................................... 9 3.3 Configuring Desktop Sharing............................... 9 3.4 What happens when someone connects to Desktop Sharing.............. 10 4 Credits and License 12 A Installation 13 A.1 How to obtain Desktop Sharing.............................. 13 A.2 Compilation and Installation............................... 13
Abstract Desktop Sharing is a server application that allows you to share your current session with a user on another machine, who can use a VNC client to view or even control the desktop.
Chapter 1 Introduction Desktop Sharing is a server application that allows you to share your current session with a user on another machine, who can use a VNC client to view or even control the desktop. You would typically use Desktop Sharing with the KDE VNC client, which is Remote Desktop Connection, since it closely matches the special features of Desktop Sharing. Desktop Sharing doesn t require you to start a new X session - it can share the current session. This makes it very useful when you want someone to help you perform a task. Please report any problems or feature requests to the KDE mailing lists or file a bug at http://bugs.kde.org. 5
Chapter 2 The Remote Frame Buffer protocol This chapter provides a brief description of the Remote Frame Buffer protocol used by Desktop Sharing and by other compatible systems. If you are already familiar with Remote Frame Buffer, you can safely skip this chapter. The high level implementation of a system using the Remote Frame Buffer protocol is known as Virtual Network Computer, or more often just as VNC. Remote Frame Buffer (or RFB for short) is a simple protocol for remote access to graphical user interfaces. It works at the frame-buffer level, which roughly corresponds to the rendered screen image, which means that it can be applied to all windowing systems (including X11, Mac OS and Microsoft Windows ). Remote Frame Buffer applications exist for many platforms, and can often be freely re-distributed. In the Remote Frame Buffer protocol, the application that runs on the machine where the user sits (containing the display, keyboard and pointer) is called the client. The application that runs on the machine where the framebuffer is located (which is running the windowing system and applications that the user is remotely controlling) is called the server. Desktop Sharing is the KDE server for the Remote Frame Buffer protocol. Remote Desktop Connection is the KDE client for the Remote Frame Buffer protocol. It takes a reasonable amount of network traffic to send an image of the framebuffer, so Remote Frame Buffer works best over high bandwidth links, such as a local area network. It is still possible to use Desktop Sharing over other links, but performance is unlikely to be as good. 6
Chapter 3 Using Desktop Sharing It is very easy to use Desktop Sharing - it has a simple interface, as shown in the screenshot below. When you want to allow someone to access your desktop, you can create an personal invitation using the New Personal Invitation... button, which will bring up a window containing the information needed to access your desktop. An example is shown below. 7
To increase security, the invitation is only valid for an hour after it is created, and of course the person connecting has to have the correct password. Since you may want to invite someone to access your desktop by email, Desktop Sharing can create invitations as email messages. You can create such an invitation using the New Email Invitation... button on the Desktop Sharing main window. This will usually bring up an email message that looks like the following, ready for you to type in the email address of the person you are sending the invitation to. 8
WARNING Desktop Sharing will warn you about the security implications of sending this information across an insecure link. You must heed those warnings. If you cannot encrypt the email (or otherwise secure the link), sending invitations by email is a very serious security risk, since anyone can read the password and address from the email as it passes over the network. This means that they can potentially take control of your machine. If you cannot encrypt the email message, it may be better to use a personal invitation, telephone the person you are giving access to, verify the identity of that person, and provide the required invitation information that way. 3.1 Managing Desktop Sharing invitations Having created an invitation (either a personal invitation or one that was sent by email), Desktop Sharing main window allows you to delete existing invitations. To just delete one of the invitations, select it with the mouse (it should become highlighted), and then select the Delete. To delete all invitations, just select the Delete All button. 3.2 Quit Desktop Sharing If you close the Desktop Sharing main window the server keeps running, which is indicated by an icon in the system tray. To stop Desktop Sharing right click on the icon in the systems tray and select Quit. 3.3 Configuring Desktop Sharing In addition to the main Desktop Sharing interface shown and described above, you can also control Desktop Sharing using the Configure... on the Desktop Sharing main window. The Desktop Sharing configuration has two pages, as shown in the screenshot below: The Network page allows control over the port that Desktop Sharing uses, as shown below. 9
The Announce service on the network checkbox controls whether Desktop Sharing announces invitations over the network using Service Location Protocol. This is normally a good idea, but only works really well with a Service Location Protocol aware client, such as Remote Desktop Connection. If you select the Use default port checkbox, then Desktop Sharing will locate a suitable port, and invitations will match this port. If you deselect this checkbox, you can specify a particular port. Specifying a particular port may be useful if you are using port-forwarding on the firewall. Note that if Service Location Protocol is turned on, this will automatically deal with identifying the correct port. The Security page allows you configure settings related to access to the Desktop Sharing server. The Allow uninvited connections check box controls whether Desktop Sharing allows connection without an invitation. If uninvited connections are allowed, then you should probably specify a password. You can also use the check boxes here to choose whether you have to confirm the connection before it proceeds, and whether the person connecting can control the desktop, or only view. If the machine is a workstation, and you choose to allow uninvited connections, you probably want to select the Ask before accepting connections. Conversely, if the machine is a server and you are using Desktop Sharing for remote administration, you probably want to deselect this option. NOTE Desktop Sharing uses the normal RFB password system, which does not transfer your password in the clear across the network. Instead, it uses a challenge-response system. This is reasonably secure, as long as the password is securely guarded. 3.4 What happens when someone connects to Desktop Sharing When someone connects to Desktop Sharing on your machine, you will get a pop-up notification that looks like the following screenshot, unless you are accepting uninvited connections without warning. 10
If you Accept Connection, the client can proceed to authenticate (which requires the correct password for a personal invitation or email invitation). If you Refuse Connection, then the attempt to connect will be terminated. The Allow remote user to control keyboard and mouse check box determines whether this client can only observe, or can take control of your machine. If the client connection is successful, and used the password from a personal invitation or email invitation, then that invitation is deleted and cannot be used again. You will also get a small pop-up window in the dock, that shows that the connection has been made. 11
Chapter 4 Credits and License Desktop Sharing Program copyright 2002 Tim Jansen tim@tjansen.de Contributors: Ian Reinhart Geiser geiseri@kde.org Documentation Copyright (c) 2003 Brad Hards bradh@frogmouth.net This documentation is licensed under the terms of the GNU Free Documentation License. This program is licensed under the terms of the GNU General Public License. 12
Appendix A Installation A.1 How to obtain Desktop Sharing Desktop Sharing is part of the KDE project http://www.kde.org/. Desktop Sharing can be found on the download site of the KDE project. A.2 Compilation and Installation For detailed information on how to compile and install KDE applications see Building and Running KDE Software From Source Since KDE uses cmake you should have no trouble compiling it. Should you run into problems please report them to the KDE mailing lists. 13